[Free] 2019(Nov) EnsurePass F5 101 Dumps with VCE and PDF 11-20

Get Full Version of the Exam

Question No.11

Replicating a large database between sites could take several hours without WOM, and only several minutes with WOM.

  1. True

  2. False

Correct Answer: A

Question No.12

% of F5 products are sent through thorough software testing before being sold to customers.









Correct Answer: A

Question No.13

A site wishes to delegate the name .wmysite.com to a GTM System. Which entry would be appropriate in their current DNS servers?

  1. vww.mysite.com. IN A

  2. 15.33.addrin.arpa.com IN PRT .wiw.mysite.com.

  3. iw.mysite.com. IN CNAME wwip.mysite.com.

  4. wwmysite.com. IN DEL wiwGTM.mysite.com.

Correct Answer: C

Question No.14

A site is load balancing to a pool of web servers. Which statement is true concerning BIG-IP#39;s ability to verify whether the web servers are functioning properly or not?

  1. Web server monitors can test the content of any page on the server.

  2. Web server monitors always verify the contents of the index.html page.

  3. Web server monitors can test whether the server#39;s address is reachable, but cannot test a page#39;s content.

  4. Web server monitors can test the content of static web pages, but cannot test pages that would require the web server to dynamically build content.

Correct Answer: A

Question No.15

Organizations are moving towards a cloud solution are good candidates for F5 WOM solutions.

  1. True

  2. False

Correct Answer: A

Question No.16

When a virtual server has an HTTP profile with compression enabled, which traffic is compressed by the BIG-IP?

  1. selected traffic from the BIG-IP to the client

  2. all sever-side traffic for that virtual server

  3. selected traffic from the pool member to the BIG-IP

  4. all client-side traffic for that virtual server

Correct Answer: A

Question No.17

Requests that do not meet the ASM security policies can:

  1. Generate learning suggestions

  2. Be blocked

  3. All of the above

  4. Be logged

Correct Answer: C

Question No.18

Which of the following are default settings when using the Policy Builder to build a security policy based on the QA lab deployment scenario? (Choose two.)

  1. All learned entities are placed in staging.

  2. Attack signatures are not placed in staging

  3. The security policy is placed in blocking mode

  4. Tightening is enabled only on file types and parameters.

Correct Answer: BC

Question No.19

The Protected Workspace client-side action provides more client-side security than the Cache and Session Control action.

  1. True

  2. False

Correct Answer: A

Question No.20

Which two can be a part of a virtual server#39;s definition? (Choose two.)

  1. rule(s)

  2. pool(s)

  3. monitor(s)

  4. node address(es)

  5. load balancing method(s)

Correct Answer: AB

Get Full Version of the Exam
101 Dumps
101 VCE and PDF